Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions
Questions # 1:

You want to hide a secret.txt document inside c:\windows\system32\tcpip.dll kernel library using ADS streams. How will you accomplish this?

Options:

A.

copy secret.txt c:\windows\system32\tcpip.dll kernel>secret.txt


B.

copy secret.txt c:\windows\system32\tcpip.dll:secret.txt


C.

copy secret.txt c:\windows\system32\tcpip.dll |secret.txt


D.

copy secret.txt >< c:\windows\system32\tcpip.dll kernel secret.txt


Questions # 2:

Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?

Options:

A.

Configure Port Security on the switch


B.

Configure Port Recon on the switch


C.

Configure Switch Mapping


D.

Configure Multiple Recognition on the switch


Questions # 3:

Vulnerability scanners are automated tools that are used to identify vulnerabilities and misconfigurations of hosts. They also provide information regarding mitigating discovered vulnerabilities.

Question # 3

Which of the following statements is incorrect?

Options:

A.

Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.


B.

Vulnerability scanners can help identify out-of-date software versions, missing patches, or system upgrades


C.

They can validate compliance with or deviations from the organization's security policy


D.

Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without user intervention


Questions # 4:

In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?

Options:

A.

EEP


B.

ESP


C.

EAP


D.

EIP


Questions # 5:

Steven the hacker realizes the network administrator of Acme Corporation is using syskey in Windows 2008 Server to protect his resources in the organization. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to use brute force dictionary attacks on the hashes. Steven runs a program called "SysCracker" targeting the Windows 2008 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch the attack. How many bits does Syskey use for encryption?

Options:

A.

40-bit encryption


B.

128-bit encryption


C.

256-bit encryption


D.

64-bit encryption


Questions # 6:

Samuel is the network administrator of DataX Communications, Inc. He is trying to configure his firewall to block password brute force attempts on his network. He enables blocking the intruder's IP address for a period of 24 hours' time after more than three unsuccessful attempts. He is confident that this rule will secure his network from hackers on the Internet.

But he still receives hundreds of thousands brute-force attempts generated from various IP addresses around the world. After some investigation he realizes that the intruders are using a proxy somewhere else on the Internet which has been scripted to enable the random usage of various proxies on each request so as not to get caught by the firewall rule.

Later he adds another rule to his firewall and enables small sleep on the password attempt so that if the password is incorrect, it would take 45 seconds to return to the user to begin another attempt. Since an intruder may use multiple machines to brute force the password, he also throttles the number of connections that will be prepared to accept from a particular IP address. This action will slow the intruder's attempts.

Samuel wants to completely block hackers brute force attempts on his network.

What are the alternatives to defending against possible brute-force password attacks on his site?

Options:

A.

Enforce a password policy and use account lockouts after three wrong logon attempts even though this might lock out legit users


B.

Enable the IDS to monitor the intrusion attempts and alert you by e-mail about the IP address of the intruder so that you can block them at the

Firewall manually


C.

Enforce complex password policy on your network so that passwords are more difficult to brute force


D.

You cannot completely block the intruders attempt if they constantly switch proxies


Questions # 7:

Dan is conducting penetration testing and has found a vulnerability in a Web Application which gave him the sessionID token via a cross site scripting vulnerability. Dan wants to replay this token. However, the session ID manager (on the server) checks the originating IP address as well. Dan decides to spoof his IP address in order to replay the sessionID. Why do you think Dan might not be able to get an interactive session?

Options:

A.

Dan cannot spoof his IP address over TCP network


B.

The scenario is incorrect as Dan can spoof his IP and get responses


C.

The server will send replies back to the spoofed IP address


D.

Dan can establish an interactive session only if he uses a NAT


Questions # 8:

Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him ''just to double check our records.'' Jane does not suspect anything amiss, and parts with her password. Jack can now access Brown Co.'s computers with a valid user name and password, to steal the cookie recipe. What kind of attack is being illustrated here?

Options:

A.

Reverse Psychology


B.

Reverse Engineering


C.

Social Engineering


D.

Spoofing Identity


E.

Faking Identity


Questions # 9:

BankerFox is a Trojan that is designed to steal users' banking data related to certain banking entities.

When they access any website of the affected banks through the vulnerable Firefox 3.5 browser, the Trojan is activated and logs the information entered by the user. All the information entered in that website will be logged by the Trojan and transmitted to the attacker's machine using covert channel.

BankerFox does not spread automatically using its own means. It needs an attacking user's intervention in order to reach the affected computer.

Question # 9

What is the most efficient way an attacker located in remote location to infect this banking Trojan on a victim's machine?

Options:

A.

Physical access - the attacker can simply copy a Trojan horse to a victim's hard disk infecting the machine via Firefox add-on extensions


B.

Custom packaging - the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer


C.

Custom packaging - the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer


D.

Custom packaging - the attacker can create a custom Trojan horse that mimics the appearance of a program that is unique to that particular computer


E.

Downloading software from a website? An attacker can offer free software, such as shareware programs and pirated mp3 files


Questions # 10:

This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.

Options:

A.

Unique SQL Injection


B.

Blind SQL Injection


C.

Generic SQL Injection


D.

Double SQL Injection


Questions # 11:

Peter extracts the SID list from Windows 2008 Server machine using the hacking tool "SIDExtracter". Here is the output of the SIDs:

Question # 11

From the above list identify the user account with System Administrator privileges?

Options:

A.

John


B.

Rebecca


C.

Sheela


D.

Shawn


E.

Somia


F.

Chang


G.

Micah


Questions # 12:

Attacking well-known system defaults is one of the most common hacker attacks. Most software is shipped with a default configuration that makes it easy to install and setup the application. You should change the default settings to secure the system.

Which of the following is NOT an example of default installation?

Options:

A.

Many systems come with default user accounts with well-known passwords that administrators forget to change


B.

Often, the default location of installation files can be exploited which allows a hacker to retrieve a file from the system


C.

Many software packages come with "samples" that can be exploited, such as the sample programs on IIS web services


D.

Enabling firewall and anti-virus software on the local system


Questions # 13:

Google uses a unique cookie for each browser used by an individual user on a computer. This cookie contains information that allows Google to identify records about that user on its database. This cookie is submitted every time a user launches a Google search, visits a site using AdSense etc. The information stored in Google's database, identified by the cookie, includes

    Everything you search for using Google

    Every web page you visit that has Google Adsense ads

How would you prevent Google from storing your search keywords?

Options:

A.

Block Google Cookie by applying Privacy and Security settings in your web browser


B.

Disable the Google cookie using Google Advanced Search settings on Google Search page


C.

Do not use Google but use another search engine Bing which will not collect and store your search keywords


D.

Use MAC OS X instead of Windows 7. Mac OS has higher level of privacy controls by default.


Questions # 14:

Which type of hacker represents the highest risk to your network?

Options:

A.

black hat hackers


B.

grey hat hackers


C.

disgruntled employees


D.

script kiddies


Questions # 15:

Stephanie works as a records clerk in a large office building in downtown Chicago. On Monday, she went to a mandatory security awareness class (Security5) put on by her company's IT department. During the class, the IT department informed all employees that everyone's Internet activity was thenceforth going to be monitored.

Stephanie is worried that her Internet activity might give her supervisor reason to write her up, or worse get her fired. Stephanie's daily work duties only consume about four hours of her time, so she usually spends the rest of the day surfing the web. Stephanie really enjoys surfing the Internet but definitely does not want to get fired for it.

What should Stephanie use so that she does not get in trouble for surfing the Internet?

Options:

A.

Stealth IE


B.

Stealth Anonymizer


C.

Stealth Firefox


D.

Cookie Disabler


Questions # 16:

What file system vulnerability does the following command take advantage of?

type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe

Options:

A.

HFS


B.

Backdoor access


C.

XFS


D.

ADS


Questions # 17:

XSS attacks occur on Web pages that do not perform appropriate bounds checking on data entered by users. Characters like < > that mark the beginning/end of a tag should be converted into HTML entities.

Question # 17

Question # 17

What is the correct code when converted to html entities?

Question # 17

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Questions # 18:

Maintaining a secure Web server requires constant effort, resources, and vigilance from an organization. Securely administering a Web server on a daily basis is an essential aspect of Web server security.

Maintaining the security of a Web server will usually involve the following steps:

1. Configuring, protecting, and analyzing log files

2. Backing up critical information frequently

3. Maintaining a protected authoritative copy of the organization's Web content

4. Establishing and following procedures for recovering from compromise

5. Testing and applying patches in a timely manner

6. Testing security periodically.

In which step would you engage a forensic investigator?

Options:

A.

1


B.

2


C.

3


D.

4


E.

5


F.

6


Questions # 19:

In the context of Trojans, what is the definition of a Wrapper?

Options:

A.

An encryption tool to protect the Trojan


B.

A tool used to bind the Trojan with a legitimate file


C.

A tool used to calculate bandwidth and CPU cycles wasted by the Trojan


D.

A tool used to encapsulate packets within a new header and footer


Questions # 20:

Which Steganography technique uses Whitespace to hide secret messages?

Options:

A.

snow


B.

beetle


C.

magnet


D.

cat


Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions